Digital Security: Find & Recover a Lost or Stolen Device

Sep 09, 2014

Most of us rely on mobile devices but they – and the data they contain – are easily lost or stolen.

The solution? Recovery software that lets you lock/erase/find/recover lost or stolen devices remotely.

Suggestions

Prey Project https://preyproject.com

Supported Platforms: Android, iOS, Mac OS X, WindowsCost: $5/month

Prey is an anti-theft tracking software solution that lets you remotely locate, lock, wipe and recover your misplaced devices. You do this by logging into a website where you can also sound an alarm or show an onscreen message to let a thief know you’re after him.

Orbicle Undercover http://orbicule.com

Supported Platforms: Mac OS XCost: $50

Undercover transmits location information from a stolen Mac. This information includes the coordinates from wireless location tracking, and the internal and external IP addresses, enabling the police to accurately trace the Mac's physical location, in collaboration with the Internet Service Provider.

If your Mac has a built-in or external camera, Undercover will transmit pictures of the thief and his surroundings as well as screenshots of your stolen Mac at regular intervals. These screenshots will sooner or later reveal the thief's identity (e.g. when chatting, reading and writing emails,...) making it much easier to work with law enforcement in order to recover your Mac.

When the Mac is marked as stolen, Undercover will continuously record keystrokes, allowing you to view every bit of text the thief has entered on your stolen Mac (except for passwords).

Related Content

This post was one of a series of five that discussed different aspects of digital security. It was based on content from a presentation at the 2014 SAF Annual Convention and posted in the wake of the recent celebrity photo hacking scandal in September after I heard from some people asking for more information. Other entries in the series appear below.

We increasingly rely on our digital devices but that data is fragile. It can be lost instantly if the machine is stolen or damaged (fire, water, etc.) suffers mechanical failure or is infected by viruses or malware.